{"id":5235,"date":"2025-11-14T19:58:16","date_gmt":"2025-11-14T17:58:16","guid":{"rendered":"https:\/\/www.corelan-certified.com\/index.php\/about\/"},"modified":"2025-11-14T19:58:27","modified_gmt":"2025-11-14T17:58:27","slug":"about","status":"publish","type":"page","link":"https:\/\/www.corelan-certified.com\/index.php\/about\/","title":{"rendered":"About"},"content":{"rendered":"\n  \n    <section class=\"u-clearfix u-section-1\" id=\"block-2\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\">\n        <div class=\"data-layout-selected u-clearfix u-expanded-width u-layout-wrap u-layout-wrap-1\">\n          <div class=\"u-gutter-0 u-layout\">\n            <div class=\"u-layout-col\">\n              <div class=\"u-size-12\">\n                <div class=\"u-layout-row\">\n                  <div class=\"u-container-style u-layout-cell u-shape-rectangle u-size-19 u-layout-cell-1\">\n                    <div class=\"u-container-layout u-valign-top u-container-layout-1\">\n                      <img decoding=\"async\" class=\"u-image u-image-contain u-image-default u-preserve-proportions u-image-1\" src=\"https:\/\/www.corelan-certified.com\/wp-content\/uploads\/2025\/11\/PeterHeadFade-3.png\" alt=\"\" data-image-width=\"448\" data-image-height=\"448\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\" data-animation-delay=\"0\">\n                    <\/div>\n                  <\/div>\n                  <div class=\"u-container-style u-layout-cell u-shape-rectangle u-size-41 u-layout-cell-2\">\n                    <div class=\"u-container-layout u-container-layout-2\">\n                      <h3 class=\"u-text u-text-default u-text-1\">About Me<\/h3>\n                      <p class=\"u-text u-text-2\">\n                        <br> Hi,&nbsp;<br>\n                        <br>I\u2019m Peter Van Eeckhoutte, founder of Corelan, creator of the Corelan Courses, the Corelan Certification Track, and the original author of mona.py \u2014 the go-to tool for many Windows exploit developers and vulnerability researchers..&nbsp;<br>\n                        <br>With over two decades of hands-on experience in exploit development, research and training, I\u2019ve dedicated my career to helping security professionals go far beyond surface-level techniques.&nbsp;<br>\n                        <br>My goal has always been simple: to teach people how things <span style=\"font-style: italic;\">really<\/span> work, and how to build and debug exploits from a place of clarity, control, honesty and deep understanding \u2014 not just copy\/paste intuition or \"do as I say\".<br>\n                      <\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n              <div class=\"u-size-12\">\n                <div class=\"u-layout-row\">\n                  <div class=\"u-container-style u-layout-cell u-shading u-shape-rectangle u-size-60 u-uploaded-video u-video u-video-1\">\n                    <div class=\"u-background-video u-expanded\" style=\"\">\n                      <div class=\"embed-responsive\">\n                        <video class=\"embed-responsive-item\" data-autoplay=\"1\" loop=\"\" muted=\"1\" autoplay=\"autoplay\" playsinline=\"\">\n                          <source src=\"https:\/\/www.corelan-certified.com\/wp-content\/uploads\/2025\/11\/CCEDPeterWhiteboard-3.mp4\" type=\"video\/mp4\">\n                          <p>Your browser does not support HTML5 video.<\/p>\n                        <\/video>\n                      <\/div>\n                      <div class=\"u-video-shading\" style=\"background-image: linear-gradient(0deg, rgba(0, 0, 0, 0.6), rgba(0, 0, 0, 0.6));\"><\/div>\n                    <\/div>\n                    <div class=\"u-container-layout u-container-layout-3\">\n                      <p class=\"u-text u-text-3\">\n                        <br>Since 2010, I\u2019ve been teaching Corelan Trainings around the world. I\u2019ve trained thousands of students \u2014 from independent researchers to members of military, law enforcement, and corporate red teams.<br>\n                        <br>Many walked away saying the training changed how they think, not just how they write exploits.&nbsp;<br>\n                        <br>Back in 2009, I founded the Corelan Team, and started publishing free research on <a rel=\"noopener\" target=\"_new\" href=\"https:\/\/www.corelan.be\" class=\"u-active-none u-border-none u-btn u-button-style u-hover-none u-none u-text-palette-1-base u-btn-1\">corelan.be<\/a>, driven by a belief that knowledge should be shared, not hoarded.&nbsp;<br>\n                        <br>Over the years, that research has been quoted in numerous books, featured in countless publications, and has influenced professionals, students, and trainers alike \u2014 many of whom have built careers and courses on top of that work.&nbsp;<br>\n                        <br>But Corelan is more than just research and tools. It\u2019s about fostering a culture of depth, curiosity, and integrity \u2014 and providing a safe space for people to share, to learn, to ask questions without getting yelled at.<br>\n                        <br>\n                      <\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n              <div class=\"u-size-12\">\n                <div class=\"u-layout-row\">\n                  <div class=\"u-container-style u-layout-cell u-shape-rectangle u-size-31 u-layout-cell-4\">\n                    <div class=\"u-container-layout u-valign-middle u-container-layout-4\">\n                      <p class=\"u-text u-text-4\"> Outside of my professional work, I\u2019m a father \u2014 and that remains one of my most important roles. Being present and available for my daughter is a daily reminder of what really matters.&nbsp;<br>\n                        <br>I\u2019m also passionate about photography, fascinated by how light, perspective, and stillness can capture a moment \u2014 much like reverse engineering captures the essence of how something works.&nbsp;<br>\n                        <br>When I have the time, I enjoy playing chess, both for the strategy and the quiet focus it demands. It\u2019s a humbling reminder that every move has consequences, just like in exploit development.&nbsp; Feel free to send me an invite on chess.com, you'll find me there as \"corelanc0d3r\".&nbsp; I'm an amateur player, please be gentle \ud83d\ude42&nbsp;&nbsp;<br>\n                        <br>I love music, books, fountain pens, and cooking. I see those things not as hobbies, but as ways to reconnect with myself and stay grounded.<br>\n                      <\/p>\n                    <\/div>\n                  <\/div>\n                  <div class=\"u-container-style u-layout-cell u-shape-rectangle u-size-29 u-layout-cell-5\">\n                    <div class=\"u-container-layout u-container-layout-5\">\n                      <img decoding=\"async\" class=\"custom-expanded u-image u-image-round u-radius u-image-2\" src=\"https:\/\/www.corelan-certified.com\/wp-content\/uploads\/2025\/11\/PeterWindow-3.png\" alt=\"\" data-image-width=\"2100\" data-image-height=\"2800\">\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n              <div class=\"u-size-12\">\n                <div class=\"u-layout-row\">\n                  <div class=\"u-container-style u-image u-layout-cell u-shading u-shape-rectangle u-size-18 u-image-3\" style=\"background-image: linear-gradient(rgba(0, 0, 0, 0.4), rgba(0, 0, 0, 0.4)), url(&quot;https:\/\/www.corelan-certified.com\/wp-content\/uploads\/2025\/11\/photo-1692399320866-9c417a4d7817-3.jpeg&quot;);\">\n                    <div class=\"u-container-layout u-container-layout-6\"><\/div>\n                  <\/div>\n                  <div class=\"u-container-style u-layout-cell u-shape-rectangle u-size-42 u-layout-cell-7\" data-image-width=\"1280\" data-image-height=\"853\">\n                    <div class=\"u-container-layout u-container-layout-7\">\n                      <p class=\"u-text u-text-5\"> There\u2019s also something quietly powerful about writing with a fountain pen. The deliberate act of filling a reservoir, selecting the right ink, and sliding a nib across fragile paper \u2014 it slows the world down.&nbsp;<br>\n                        <br>Each stroke reveals the ink\u2019s character: its sheen, shading, flow.&nbsp;<br>No two lines are exactly the same, and none can be erased.&nbsp;<br>It\u2019s a small but meaningful ritual in a world obsessed with speed and undo buttons.&nbsp;<br>\n                        <br>Writing this way is not just about words \u2014 it\u2019s about presence, intention, and accepting imperfection.&nbsp;<br>A fountain pen doesn\u2019t tolerate distraction; it invites focus. You become aware of pressure, of angle, of rhythm. It teaches you to leave a mark that is permanent, unapologetic, and uniquely yours.&nbsp;<br>\n                        <br>Much like exploit development, it\u2019s about precision, patience, and letting tools reveal their full potential in skilled hands.&nbsp;<br>\n                      <\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n              <div class=\"u-size-12\">\n                <div class=\"u-layout-row\">\n                  <div class=\"u-container-style u-layout-cell u-size-60 u-layout-cell-8\">\n                    <div class=\"u-container-layout u-container-layout-8\">\n                      <p class=\"u-text u-text-default u-text-6\"> And that brings me to something I consider essential:&nbsp; &nbsp;taking care of your mental health.&nbsp;<br>\n                        <br>The (cybersecurity) world can be intense and high-pressure, and I\u2019ve learned \u2014 sometimes the hard way \u2014 that pushing through without rest or reflection doesn\u2019t lead anywhere good.&nbsp;<br>\n                        <br>Whether it's a walk, journaling, a slow meal, or asking for help, caring for yourself isn't optional. It's foundational \u2014 for doing good work, for showing up for others, and for staying in the game for the long run.&nbsp;<br>\n                        <br>Thanks for stopping by.<br>\n                        <br>&nbsp;\u2014 Peter\n                      <\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n    \n    \n    \n    \n  \n","protected":false},"excerpt":{"rendered":"<p>About Me Hi,&nbsp; I\u2019m Peter Van Eeckhoutte, founder of Corelan, creator of the Corelan Courses, the Corelan Certification Track, and the original author of mona.py \u2014 the go-to tool for many Windows exploit developers and vulnerability researchers..&nbsp; With over two decades of hands-on experience in exploit development, research and training, I\u2019ve dedicated my career to &hellip; <a href=\"https:\/\/www.corelan-certified.com\/index.php\/about\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;About&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5235","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>About - Corelan Certified Exploit Developer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan-certified.com\/index.php\/about\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About - Corelan Certified Exploit Developer\" \/>\n<meta property=\"og:description\" content=\"About Me Hi,&nbsp; I\u2019m Peter Van Eeckhoutte, founder of Corelan, creator of the Corelan Courses, the Corelan Certification Track, and the original author of mona.py \u2014 the go-to tool for many Windows exploit developers and vulnerability researchers..&nbsp; With over two decades of hands-on experience in exploit development, research and training, I\u2019ve dedicated my career to &hellip; Continue reading &quot;About&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan-certified.com\/index.php\/about\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan Certified Exploit Developer\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-14T17:58:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@corelanconsult\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan-certified.com\\\/index.php\\\/about\\\/\",\"url\":\"https:\\\/\\\/www.corelan-certified.com\\\/index.php\\\/about\\\/\",\"name\":\"About - Corelan Certified Exploit Developer\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan-certified.com\\\/#website\"},\"datePublished\":\"2025-11-14T17:58:16+00:00\",\"dateModified\":\"2025-11-14T17:58:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan-certified.com\\\/index.php\\\/about\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan-certified.com\\\/index.php\\\/about\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan-certified.com\\\/index.php\\\/about\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan-certified.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan-certified.com\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan-certified.com\\\/\",\"name\":\"Corelan Certified Exploit Developer\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan-certified.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan-certified.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan-certified.com\\\/#organization\",\"name\":\"Corelan Certified Exploit Developer\",\"url\":\"https:\\\/\\\/www.corelan-certified.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan-certified.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan-certified.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/CCEDLogo-26.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan-certified.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/CCEDLogo-26.png\",\"width\":1080,\"height\":1080,\"caption\":\"Corelan Certified Exploit Developer\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan-certified.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanconsult\",\"https:\\\/\\\/www.instagram.com\\\/corelanconsulting\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About - Corelan Certified Exploit Developer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan-certified.com\/index.php\/about\/","og_locale":"en_US","og_type":"article","og_title":"About - Corelan Certified Exploit Developer","og_description":"About Me Hi,&nbsp; I\u2019m Peter Van Eeckhoutte, founder of Corelan, creator of the Corelan Courses, the Corelan Certification Track, and the original author of mona.py \u2014 the go-to tool for many Windows exploit developers and vulnerability researchers..&nbsp; With over two decades of hands-on experience in exploit development, research and training, I\u2019ve dedicated my career to &hellip; Continue reading \"About\"","og_url":"https:\/\/www.corelan-certified.com\/index.php\/about\/","og_site_name":"Corelan Certified Exploit Developer","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_modified_time":"2025-11-14T17:58:27+00:00","twitter_card":"summary_large_image","twitter_site":"@corelanconsult","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.corelan-certified.com\/index.php\/about\/","url":"https:\/\/www.corelan-certified.com\/index.php\/about\/","name":"About - Corelan Certified Exploit Developer","isPartOf":{"@id":"https:\/\/www.corelan-certified.com\/#website"},"datePublished":"2025-11-14T17:58:16+00:00","dateModified":"2025-11-14T17:58:27+00:00","breadcrumb":{"@id":"https:\/\/www.corelan-certified.com\/index.php\/about\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan-certified.com\/index.php\/about\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan-certified.com\/index.php\/about\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan-certified.com\/"},{"@type":"ListItem","position":2,"name":"About"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan-certified.com\/#website","url":"https:\/\/www.corelan-certified.com\/","name":"Corelan Certified Exploit Developer","description":"","publisher":{"@id":"https:\/\/www.corelan-certified.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan-certified.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan-certified.com\/#organization","name":"Corelan Certified Exploit Developer","url":"https:\/\/www.corelan-certified.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan-certified.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan-certified.com\/wp-content\/uploads\/2025\/07\/CCEDLogo-26.png","contentUrl":"https:\/\/www.corelan-certified.com\/wp-content\/uploads\/2025\/07\/CCEDLogo-26.png","width":1080,"height":1080,"caption":"Corelan Certified Exploit Developer"},"image":{"@id":"https:\/\/www.corelan-certified.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanconsult","https:\/\/www.instagram.com\/corelanconsulting"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan-certified.com\/index.php\/wp-json\/wp\/v2\/pages\/5235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan-certified.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.corelan-certified.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan-certified.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan-certified.com\/index.php\/wp-json\/wp\/v2\/comments?post=5235"}],"version-history":[{"count":1,"href":"https:\/\/www.corelan-certified.com\/index.php\/wp-json\/wp\/v2\/pages\/5235\/revisions"}],"predecessor-version":[{"id":5245,"href":"https:\/\/www.corelan-certified.com\/index.php\/wp-json\/wp\/v2\/pages\/5235\/revisions\/5245"}],"wp:attachment":[{"href":"https:\/\/www.corelan-certified.com\/index.php\/wp-json\/wp\/v2\/media?parent=5235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}